Over the life of CentOS 7, its repository has collected 58 different versions of the kernel. On the other end of the GNU/Linux spectrum, there is the LTS of the Ubuntu 16.04 version with more than a hundred in it. If focused on kernel exploits, we relieve ourselves of the necessity to worry about the things that have no relevance to the task. But what if a vulnerability affects kernel versions released over several years, and the used one is unknown?
You can always test your luck but it can turn away from you. As a result, your client may accidentally find out profits are missing due to a server that has its unscheduled kernel panic and despair.
In this talk, we will discuss how a pentester can get rid of some LPE development routine and how to check the workability of a random proof-of-concept and kernel coverage without much effort.